Principal Analyst, Computer Network Defense Center
1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
4. Analysis and triage of network anomalies that should be considered Events of Interest (EOI). Provide basic assessment of the anomaly, designate it as an EOI and coordinate response with CND response team.
5. Evaluate firewall change requests and assess organizational risk.
6. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
7. Assists with implementation of counter-measures or mitigati ng controls.
8. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
9. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
10. Prepares incident reports of analysis methodology and results.
11. Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.
12. May serve as a technical team or task leader.
13. Maintains current knowledge of relevant technology as assigned.
14. Participates in special projects as required.
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
Must have a good understanding of networks at the packet level and be able to analyze packet captures at the expert level.
Must have experience using CND tools such as Enterprise Security Information and Event Management Systems (SIEM), Intrusion Detection and Prevention Systems (IDS, IPS), Web Content Monitoring Systems (Palo Alto), Firewall and Syslog logs.
Must have experience creating content in Splunk to hunt for malicious activity and ability to assist with implementation of countermeasures or mitigating controls.
Must be able to review multiple data sources to gather Indications and Warnings and Attack Sensing and Warnings information.
Requires Both DOD8570 IAT-III and CNDSP Specialty Incident Responder Certifications to start work on the task order.
8-10 years of related experience in data security administration; and/or cybersecurity/information assurance experience.
Must be willing to obtain and maintain CI Poly.
Must be willing to work shifts in support of 24X7X365 operations.
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.